Sciweavers

1236 search results - page 42 / 248
» Efficient Interpretation Policies
Sort
View
ICDE
2009
IEEE
143views Database» more  ICDE 2009»
14 years 10 months ago
Auditing a Database under Retention Restrictions
Auditing the changes to a database is critical for identifying malicious behavior, maintaining data quality, and improving system performance. But an accurate audit log is a histor...
Wentian Lu, Gerome Miklau
WORDS
2005
IEEE
14 years 2 months ago
An RBAC Framework for Time Constrained Secure Interoperation in Multi-domain Environments
In emerging e-commerce applications, time constrained information sharing between different systems is becoming a common phenomenon. A flexible and efficient mechanism is needed t...
Smithi Piromruen, James B. D. Joshi
DBSEC
2006
124views Database» more  DBSEC 2006»
13 years 10 months ago
Consolidating the Access Control of Composite Applications and Workflows
The need for enterprise application integration projects leads to complex composite applications. For the sake of security and efficiency, consolidated access control policies for ...
Martin Wimmer, Alfons Kemper, Maarten Rits, Volkma...
NIPS
2001
13 years 10 months ago
The Emergence of Multiple Movement Units in the Presence of Noise and Feedback Delay
Tangential hand velocity profiles of rapid human arm movements often appear as sequences of several bell-shaped acceleration-deceleration phases called submovements or movement un...
Michael Kositsky, Andrew G. Barto
ADAEUROPE
2005
Springer
14 years 2 months ago
Integrating Application-Defined Scheduling with the New Dispatching Policies for Ada Tasks
: In previous papers we had presented an application program interface (API) that enabled applications to use application-defined scheduling algorithms for Ada tasks in a way compa...
Mario Aldea Rivas, Javier Miranda, Michael Gonz&aa...